Player FM - Internet Radio Done Right
Checked 12M ago
Добавлено пять года назад
Kandungan disediakan oleh ManageEngine ADSolutions. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh ManageEngine ADSolutions atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
Player FM - Aplikasi Podcast
Pergi ke luar talian dengan aplikasi Player FM !
Pergi ke luar talian dengan aplikasi Player FM !
Podcast Berbaloi untuk Didengar
DITAJA
<
<div class="span index">1</div> <span><a class="" data-remote="true" data-type="html" href="/series/the-agile-brand-with-greg-kihlstromr">The Agile Brand with Greg Kihlström®</a></span>


Don't miss a thing. Hear directly from leading brands and marketing technology platforms about the challenges and opportunities facing marketers today, from AI to building customer lifetime value as well as business value. The Agile Brand with Greg Kihlström® features executives and thought leaders from top brands and platforms discussing the trends driving the industry forward, like first-party data strategies, artificial intelligence, consumer data privacy, omnichannel customer experience, and more. The Agile Brand is hosted by Greg Kihlström, advisor and consultant to leading brands, speaker, entrepreneur, and best-selling author. It provides a fresh perspective on the continually evolving dynamic between brands and the audiences they serve.
ManageEngine’s Weekly IT Security Podcast series.
Tandakan semua sebagai (belum) dimainkan
Manage series 2547582
Kandungan disediakan oleh ManageEngine ADSolutions. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh ManageEngine ADSolutions atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
…
continue reading
35 episod
Tandakan semua sebagai (belum) dimainkan
Manage series 2547582
Kandungan disediakan oleh ManageEngine ADSolutions. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh ManageEngine ADSolutions atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
…
continue reading
35 episod
Alle episoder
×
1 How to reduce the risk of insider threats with identity and access management 13:46
13:46
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai13:46
In this week's episode, Megha, product expert at ManageEngine, shares her thoughts on how organizations can reduce the risk of insider attacks with an identity and access management (IAM) solution. Listen to this episode to learn about the different types of insider threat actors in an organization and the various strategies available — Zero Trust, just-in-time access, and much more — to combat the threats posed by these actors.…
In this episode, Megha, product expert at ManageEngine, explains why you need to implement an HR-driven identity management strategy and the benefits of doing so. Tune in to discover how this strategy can help organizations improve productivity, reduce costs, and enhance employee satisfaction.
In the latest episode of our Weekly IT Security podcast series, Ram, IT security expert at ManageEngine, shares his thoughts on the importance of threat intelligence in elevating the security posture of an organization. He also explains how threat intelligence allows organizations to beef up their security against constantly evolving malicious threats and attack patterns known around the world.…

1 Log management requirements for complying with the PCI DSS 14:37
14:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai14:37
Tune in to this episode to discover how a security information and event management (SIEM) solution can help your organization comply with the PCI DSS mandate. You'll also learn the six crucial log management functions that need to be performed to be in compliance.

1 Dealing with advanced persistent threats (APTs) 12:32
12:32
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai12:32
In this episode, our cybersecurity expert explains how to equip your organization to deal with advanced persistent threats (APTs). You'll also learn about the four important capabilities a SIEM solution must have to detect and neutralize advanced persistent threats in your network.

1 People who are essential for a next-gen SOC. 12:17
12:17
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai12:17
In this episode, our cybersecurity expert explains the various responsibilities of members in a security operations center (SOC). You'll also learn how SOC teams monitor events and analyze various security threats to defend their organization's crucial resources from potential threats.
In this episode, discover the reasons behind a few of the major cyberattacks that have occurred during the pandemic. You'll also get tips and tricks to enhance the overall security posture of your environment.

1 How to build an insider threat program in your organization. 12:49
12:49
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai12:49
Discover why organizations need to have an effective insider threat program in place to tackle the growing threats posed by malicious actors within the organization. Learn the 8 steps to build an effective insider threat program.
In this episode, discover why an increasing number of organizations are embracing the Zero Trust IAM model. You can also understand five important measures that are key to the successful implementation of the model.

1 How to defend against ransomware attacks 14:53
14:53
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai14:53
In this episode, Sid, cybersecurity expert at ManageEngine, explains how ransomware attacks are becoming increasingly common and the measures which you need to have in place to avert potential attacks. Sid recommends measures such as regular backup of your data, enforcing least privilege, deployment of endpoint protection solutions, etc., to elevate the security of your network and nullify the threat posed by ransomware attacks.…

1 Efficient hybrid identity protection: two is better than one 11:09
11:09
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai11:09
Discover how implementing multi-factor authentication (MFA) can help protect against stolen passwords, identities etc. to enhance the security of your IT infrastructure.

1 Efficient hybrid identity management: Breaking down passwords (Part 1) 11:50
11:50
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai11:50
In this episode, learn the importance of password self-service, why multi-factor authentication (MFA) should be mandatory, and last but not least, educating users on why stronger passwords are the need of the hour to thwart password attacks.

1 Getting started with file security 15:15
15:15
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai15:15
In this episode, Sid, IT security expert at ManageEngine, explains why file analysis, file integrity monitoring and data leak prevention are must-have capabilities in a data security and monitoring tool. Listen to discover how they help in enhancing the security posture of your environment.

1 Tips to overcome cybersecurity challenges while working from home. 14:55
14:55
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai14:55
With the majority of employees now working remotely, Vivin shares three important recommendations to avert cyber attacks. He explains how the constant monitoring of firewall logs, VPN activity and key user actions can help administrators enhance the security posture of their IT environment.

1 The biggest challenges IT administrators face during a crisis 21:11
21:11
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai21:11
IT administrators encounter numerous challenges during a crisis, as the majority of employees work remotely. In this episode, Harish, Technology Evangelist at ManageEngine shares his detailed thoughts on some of the important challenges faced by administrators such as monitoring VPN, privileged access across the entire network, remote tools and much more.…
Selamat datang ke Player FM
Player FM mengimbas laman-laman web bagi podcast berkualiti tinggi untuk anda nikmati sekarang. Ia merupakan aplikasi podcast terbaik dan berfungsi untuk Android, iPhone, dan web. Daftar untuk melaraskan langganan merentasi peranti.